>>> 哲学 经济学 法学 教育学 文学 历史学 理学 工学 农学 医学 军事学 管理学 旅游学 文化学 特色库
搜索结果: 1-15 共查到SHA-1相关记录93条 . 查询时间(0.089 秒)
探讨SHA.LIN评分用于预测输尿管软镜碎石取石术结石清除率的临床价值。 方法? 回顾性分析行输尿管软镜碎石术的240例上尿路结石患者的临床资料,利用术前泌尿系CT平扫+三维重建影像资料,由同一名泌尿外科医师根据SHA.LIN、S.T.O.N.E、RUSS评分对患者术前结石特征进行评分并数据录入,分析SHA.LIN评分与结石清除情况、手术时间、住院时间、术后并发症等指标的关系。
A chosen-prefix collision attack is a stronger variant of a collision attack, where an arbitrary pair of challenge prefixes are turned into a collision. Chosen-prefix collisions are usually significan...
Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation     IAPM  AES       font style='font-size:12px;'> 2018/2/6
We study instantiating the random permutation of the block-cipher mode of operation IAPM (Integrity-Aware Parallelizable Mode) with the public random permutation of Keccak, on which the draft standard...
PBKDF2 [27] is a well-known password-based key derivation function. In order to slow attackers down, PBKDF2 introduces CPU-intensive operations based on an iterated pseudorandom function (in our case ...
Differential Fault Analysis of SHA-3 under Relaxed Fault Models     SHA-3  DFA       font style='font-size:12px;'> 2017/9/13
Keccak-based algorithms such as Secure Hash Algorithm-3 (SHA-3) will be widely used in crypto systems, and evaluating their security against different kinds of attacks is vitally important. This paper...
The first collision for full SHA-1     hash function  cryptanalysis  collision attack       font style='font-size:12px;'> 2017/3/6
SHA-1 is a widely used 1995 NIST cryptographic hash function standard that was officially deprecated by NIST in 2011 due to fundamental security weaknesses demonstrated in various analyses and theoret...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks, was first introduced by Stevens at CRYPTO 2013 with a hash collision detection algorithm. That is,...
Algebraic Fault Analysis of SHA-3     SHA-3  Keccak  Algebraic fault analysis       font style='font-size:12px;'> 2017/2/20
This paper presents an efficient algebraic fault analysis on all four modes of SHA-3 under relaxed fault models. This is the first work to apply algebraic techniques on fault analysis of SHA-3. Result...
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions. Our cost model assumes that the attack is ...
On Plausible Tree Hash Modes for SHA-3     SHA-3  Hash functions  Sakura       font style='font-size:12px;'> 2016/6/29
Discussions are currently underway about the choice of a tree hash mode of operation for a standardization. It appears that a single tree mode cannot address the specificities of all possible uses a...
Analysis of SHA-512/224 and SHA-512/256     hash functions  cryptanalysis  collisions       font style='font-size:12px;'> 2016/4/15
In 2012, NIST standardized SHA-512/224 and SHA-512/256, two truncated variants of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 on 64-bit platforms, while mainta...
The j-lanes tree hashing is a tree mode that splits an input message to j slices, computes j independent digests of each slice, and outputs the hash value of their concatenation. The j-pointers tree...
Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5     Logical cryptanalysis  MD5  SHA-1  Satisfiability       font style='font-size:12px;'> 2016/1/23
In recent years, studies about the SATisfiability Problem (short for SAT) were more and more numerous because of its conceptual simplicity and ability to express a large set of various problems. Wit...
In this work, we present practical semi-free-start collisions for SHA-512 on up to 38 (out of 80) steps with complexity 240.5 . The best previously published result was on 24 steps. The attack is b...
Malicious Hashing: Eve's Variant of SHA-1     hash functions  cryptanalysis  SHA-1       font style='font-size:12px;'> 2016/1/7
We present collisions for a version of SHA-1 with modified constants, where the colliding payloads are valid binary files. Examples are given of colliding executables, archives, and images. Our mali...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...